dc.contributor.author |
Padayachee, Keshnee
|
|
dc.date.accessioned |
2014-01-29T06:20:51Z |
|
dc.date.available |
2014-01-29T06:20:51Z |
|
dc.date.issued |
2014-01-29 |
|
dc.identifier.citation |
Padayachee, Keshnee 2014, "Aspectizing honeytokens to contain the insider threat", Preroria: University of South Africa. |
en |
dc.identifier.uri |
http://hdl.handle.net/10500/13117 |
|
dc.description.abstract |
Abstract: The aim of this paper is to provide a generic implementation strategy for honeytokens deployed within a database management system that leverages the aspect-oriented paradigm to contain the insider threat. This approach is tested by developing a proof-of-concept prototype in an aspect-oriented language, namely AspectJ. The paper also reflects on design and implementation challenges involved with deploying honeytokens to contain the insider threat. Consequently aspect orientation is proposed as a means to resolve some of these challenges. |
en |
dc.format.extent |
1 online resource (23 leaves) |
en |
dc.language.iso |
en |
en |
dc.subject |
Honeytokens |
en |
dc.subject.ddc |
005.8 |
|
dc.subject.lcsh |
Internet -- Security measures |
en |
dc.subject.lcsh |
Computer crimes -- Prevention |
en |
dc.subject.lcsh |
Computer -- Access control |
en |
dc.subject.lcsh |
Data protection -- Management |
en |
dc.subject.lcsh |
Anomaly detection (Computer security) |
en |
dc.title |
Aspectizing Honeytokens to Contain the Insider Threat |
en |
dc.type |
Article |
en |
dc.description.department |
Computer Science |
en |